Changing ROUTING_SUFFIX?

2018-05-03 Thread Dave Neary
Hi, When I set up OpenShift Origin, I left the default routing suffix .router.default.svc.cluster.local (figured if it needed changing, I'd find out sooner or later and be able to change it). Now I need to change it to have my app work, and I'm unclear what the best way to do that is - is this a

Re: Prometheus node exporter on v3.7

2018-05-03 Thread Joel Pearson
Upgrade your cluster to 3.9 just to be safe? You know you want too ... ;) On Fri, 4 May 2018 at 6:00 am, Tim Dudgeon wrote: > Any Prometheus experts out there that can comment on this? > > > On 30/04/18 15:19, Tim Dudgeon wrote: > > I'm running Prometheus an Origin cluster

Re: Prometheus node exporter on v3.7

2018-05-03 Thread Tim Dudgeon
Any Prometheus experts out there that can comment on this? On 30/04/18 15:19, Tim Dudgeon wrote: I'm running Prometheus an Origin cluster using v3.7.2 installed from the playbooks on the release-3.7 branch of openshift/openshift-ansible. It looks like the node exported was not included in

Re: projectRequests in openshift v3.6 using serviceaccount jenkins

2018-05-03 Thread Jordan Liggitt
By default, service accounts do not have access to request projects. If you want to grant that permission, it is contained in the self-provisioner cluster role, which you can grant like this: oc adm add-cluster-role-to-user self-provisioner system:serviceaccount:: On Thu, May 3, 2018 at 5:52

Re: projectRequests in openshift v3.6 using serviceaccount jenkins

2018-05-03 Thread jelmer van amen
p.s I found that curl -k -H "Authorization: Bearer $TOKEN" -H 'Accept: application/json' https://kubernetes.default.svc/oapi/v1/projectrequests Gives a similar result { "kind": "Status", "apiVersion": "v1", "metadata": {}, "status": "Failure", "message": "You may not

projectRequests in openshift v3.6 using serviceaccount jenkins

2018-05-03 Thread jelmer van amen
Hi all, I'm trying to get arquillian-cube working from jenkins. Arquillian cube want's to create new namepsaces to spin up the tests. To do this, it calls curl -k -H "Authorization: Bearer $TOKEN" -H 'Accept: application/json'